Systems and methods for facilitating secure remote access to sensitive data from an embedded device
First Claim
1. A method for facilitating secure remote access to sensitive data from an embedded device, comprising:
- obtaining the sensitive data;
securing the sensitive data to create secured sensitive data;
transmitting the secured sensitive data over a first communication channel to a first destination;
obtaining other data that relates to operation of an electronic device; and
transmitting the other data over a second communication channel to a second destination.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for facilitating secure remote access to sensitive data is provided. The system includes a plurality of electronic devices. These electronic devices are under the control of an organization. The system also includes a data router. When the data router obtains sensitive data that is to be made available to remote clients, the data router secures the sensitive data and transmits the secured sensitive data over a first communication channel to an organization-controlled server. When the data router obtains other data that is to be made available to remote clients, the data router transmits the other data over the second communication channel to a third-party server.
33 Citations
20 Claims
-
1. A method for facilitating secure remote access to sensitive data from an embedded device, comprising:
-
obtaining the sensitive data;
securing the sensitive data to create secured sensitive data;
transmitting the secured sensitive data over a first communication channel to a first destination;
obtaining other data that relates to operation of an electronic device; and
transmitting the other data over a second communication channel to a second destination. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A data router for facilitating secure remote access to sensitive data from an embedded device, comprising:
-
a processor, memory in electronic communication with the processor, program instructions stored in the memory, the program instructions being executable by the processor to implement a method comprising;
obtaining the sensitive data;
securing the sensitive data to create secured sensitive data;
transmitting the secured sensitive data over a first communication channel to a first destination;
obtaining other data that relates to operation of an electronic device; and
transmitting the other data over a second communication channel to a second destination. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A data router for facilitating secure remote access to sensitive data from an embedded device, comprising:
-
a data separation module that separates data into sensitive data and other data; and
a data securing module that secures the sensitive data to create secured sensitive data;
wherein the secured sensitive data is transmitted over a first communication channel to a first destination, and wherein the other data is transmitted over a second communication channel to a second destination. - View Dependent Claims (14, 15)
-
-
16. A data router for facilitating secure remote access to sensitive data from an embedded device, comprising:
-
means for obtaining the sensitive data;
means for securing the sensitive data to create secured sensitive data;
means for transmitting the secured sensitive data over a first communication channel to a first destination;
means for obtaining other data that relates to operation of an electronic device; and
means for transmitting the other data over a second communication channel to a second destination. - View Dependent Claims (17, 18)
-
-
19. A system for facilitating secure remote access to sensitive data from an embedded device, comprising:
-
a server; and
a data router that implements a method comprising;
securing the sensitive data to create secured sensitive data;
transmitting the secured sensitive data over a first communication channel to a first destination;
obtaining other data that relates to operation of an electronic device; and
transmitting the other data over a second communication channel to the server. - View Dependent Claims (20)
-
Specification